The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The most serious problem in the area of quantitative security evaluation is modeling of hacker's behavior. Because of the intelligent and complicated mental aspects of hackers, there are many challenges to model their behavior. Recently, there have been some efforts to use game theory for predicting hacker's behavior. However, it is necessary to revise the proposed approaches if there is a society...
The use of game theory has introduced new insights in quantitative evaluation of security and dependability. Currently, there is a wide range of useful game theoretic approaches to model the behavior of intelligent agents. However, it is necessary to revise these approaches if there is a society of hackers with significant diversity in their behaviors. In this paper, we introduce a novel approach...
The existing workflow modeling languages have some limitations and drawbacks. The aim is to introduce a new workflow modeling language based on stochastic activity networks (SANs). SANs are a powerful extension of Petri nets, which have been used in a wide range of applications. SAN-based workflow modeling language (SWML) has some high-level modeling primitives for easily modeling workflow patterns...
With rapidly growing the network bandwidth to multi-gigabits, the need for high-performance and wire-speed network security tools, such as network intrusion detection systems (NIDS), is vital. Instead of using proprietary custom network adapters, there are some flexible software solutions, such as nCap or DMA ring, which can be used with low-cost commercial network adapter products. In this paper...
Regression testing has been widely used to assure the acquirement of appropriate quality through several versions of a software program. Regression testing, however, is too expensive in that, it requires many test case executions and a large number of test cases. To provide the missing flexibility, researchers introduced prioritization techniques. The aim in this paper has been to prioritize test...
One of the most important routing protocols used in ad hoc networks is AODV. This protocol is a reactive protocol that searches routes only when they are needed. It always exchanges control packets between neighbor nodes for routing. For reduction of control overheads and bandwidth consumption and make AODV usable for VANET, we have eliminated route discovery phase by restricting neighborpsilas distance...
The aim has been to develop a modeling tool for coloured stochastic activity networks (CSANs). CSANs are a high-level extension of stochastic activity networks (SANs) which provide features for hierarchical modeling and data manipulation by introducing coloured place and macro activity. SDES is an abstract unified description for stochastic discrete-event systems. PDETool is a multi-formalism modeling...
In data stream management systems (DSMSs), data do not appear in the form of persistent relations, but rather arrives in multiple, continuous, rapid, time-varying streams. Achieving a good performance in these systems is still the main challenge. Minimizing run-time memory usage and response time are the most important performance issues. Choosing a better scheduling algorithm implies a better performance...
In this paper, we introduce an object-oriented modeling framework called UMF for modeling with graph-based formalisms, such as Petri nets and related models. UMF is based on a four layered model for defining a concrete model, including meta-formalism, formalism, model class and models. We have defined these concepts formally and have provided a sample model for showing how to use them in UMF. We have...
Any system during its lifecycle could be subject to internal or external accidental or malicious threats. Therefore attention to system security is very important nowadays. Security brings in concerns for availability, in addition to confidentiality and integrity. Many security assessment methodologies like ITSEC, CC and etc were used up to now, but most of them have some limitations for being used...
The aim is to develop a suitable method for quantifying security. We use stochastic modeling techniques for this purpose. An intrusion process is considered as a series of elementary attack phases and at each phase the interactions between the attacker and the system are analyzed rigorously. It is assumed that a typical attacker needs some time to perform an elementary attack phase. On the other hand,...
Parallel programming and distributed programming are two solutions for scientific applications to provide high performance and fast response time in parallel systems and distributed systems. Parallel and distributed systems must provide inter process communication (IPC) mechanisms like message passing mechanism as underlying platforms to enable communication between local and especially geographically...
Security quantification is a topic that has gained a lot of interest in the research community during the recent years. In this paper, a new method is proposed for modeling and quantifying attack effects on a computer system. In this work, intrusion process is considered as atomic sequential steps. Each atomic step changes the current system state. On the other hand, system tries to prevent and detect...
Today, most Internet users are worried about protecting their personal information, which may be gathered by Web services. This concern can have a profound influence on finding a way for applying privacy-aware policies on Web services. In this regard, there are just a few accessible Web services on the Web, which usually provide users with simple operation and are not able to apply the user preferences...
Web services are software components defined by WSDL, registered by UDDI and invoked by SOAP protocols. The port used by Web services and SOAP is not typically blocked by conventional firewalls. Therefore, a new type of firewall named Web service firewall or XML firewall is required. There are a number of commercial Web service firewall products. Several academic projects have also been done on Web...
Despite the benefits of data mining in a wide range of applications, this technique has raised some issues related to privacy and security of individuals. Due to these issues, data owners may prevent to share their sensitive information with data miners. In this paper, we introduce a novel approach for privacy preserving clustering (PPC) over centralized data. The proposed technique uses Haar wavelet...
Today, e-mail is one of the most popular communication facilities. E-mail list service (ELS) is a useful facility for scientific, commercial and social user groups. The main concern about ELS is how to manage and control the access of different users. To secure ELS by using security protocols and encryption/decryption mechanisms as well as user authentication, the computational overhead of servers...
Model refactoring is the process of transformation of model, which changes its internal structure for improving the qualitative features. Model refactoring should preserve the behavior of the model. Therefore, it is required to use a method to direct the process of model refactoring. It is also needed to use a formal method for accurate and unambiguous description of the model and its behavior. In...
Call centers, or their contemporary successors, contact centers, are the preferred and prevalent way for many companies to communicate with their customers. The call center industry is thus vast and rapidly expanding in terms of both workforce and economic scope. It enjoys an annual growth rate of 20% and, overall, more than half of the business transactions are conducted over the phone. The design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.